Skip to content

Instantly share code, notes, and snippets.

View security-prince's full-sized avatar

Ishaq Mohammed security-prince

View GitHub Profile

How to pass the OSCP

  1. Recon
  2. Find vuln
  3. Exploit
  4. Document it

Recon

Unicornscans in cli, nmap in msfconsole to help store loot in database.

@security-prince
security-prince / README.md
Created July 9, 2018 04:51 — forked from hofmannsven/README.md
My simply Git Cheatsheet
@security-prince
security-prince / git-deployment.md
Created July 10, 2018 13:40 — forked from noelboss/git-deployment.md
Simple automated GIT Deployment using Hooks

Simple automated GIT Deployment using GIT Hooks

Here are the simple steps needed to create a deployment from your lokal GIT repository to a server based on this in-depth tutorial.

How it works

You are developing in a working-copy on your local machine, lets say on the master branch. Most of the time, people would push code to a remote server like github.com or gitlab.com and pull or export it to a production server. Or you use a service like my Deepl.io to act upon a Web-Hook that's triggered that service.

@security-prince
security-prince / pre-commit
Created July 10, 2018 20:38 — forked from kaushikgopal/pre-commit
pre-commit git hook - no "hacking"
#!/usr/bin/env ruby
# This pre-commit hook will prevent any commit to forbidden branches
# (by default, "staging" and "production").
# Put this file in your local repo, in the .git/hooks folder
# and make sure it is executable.
# The name of the file *must* be "pre-commit" for Git to pick it up.
def current_branch()
branches = `git branch --no-color`.split(/\n/)
baseurl = "http://www.example.com"
title = "AppSec Enthusiast"
theme = "hugo-coder"
languagecode = "en"
defaultcontentlanguage = "en"
paginate = 20
canonifyurls = true
pygmentsstyle = "bw"